RU2684974C2 - Mobile device for vehicle communication authentication, method and system for authentication of mobile device for communication with a vehicle - Google Patents

Mobile device for vehicle communication authentication, method and system for authentication of mobile device for communication with a vehicle Download PDF

Info

Publication number
RU2684974C2
RU2684974C2 RU2017135020A RU2017135020A RU2684974C2 RU 2684974 C2 RU2684974 C2 RU 2684974C2 RU 2017135020 A RU2017135020 A RU 2017135020A RU 2017135020 A RU2017135020 A RU 2017135020A RU 2684974 C2 RU2684974 C2 RU 2684974C2
Authority
RU
Russia
Prior art keywords
mobile
key
vehicle
application
access
Prior art date
Application number
RU2017135020A
Other languages
Russian (ru)
Other versions
RU2017135020A3 (en
RU2017135020A (en
Inventor
Артур Томас БЬЯНКИ
Кевин Ф. МИЛИТЕЛЛО
Джон Роберт ВАН ВИМЕЕРШ
Original Assignee
ФОРД ГЛОУБАЛ ТЕКНОЛОДЖИЗ, ЭлЭлСи
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US15/372,369 priority Critical patent/US9988016B1/en
Priority to US15/372,369 priority
Application filed by ФОРД ГЛОУБАЛ ТЕКНОЛОДЖИЗ, ЭлЭлСи filed Critical ФОРД ГЛОУБАЛ ТЕКНОЛОДЖИЗ, ЭлЭлСи
Publication of RU2017135020A3 publication Critical patent/RU2017135020A3/ru
Publication of RU2017135020A publication Critical patent/RU2017135020A/en
Application granted granted Critical
Publication of RU2684974C2 publication Critical patent/RU2684974C2/en

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/09Arrangements for giving variable traffic instructions
    • G08G1/0962Arrangements for giving variable traffic instructions having an indicator mounted inside the vehicle, e.g. giving voice messages
    • G08G1/0968Systems involving transmission of navigation instructions to the vehicle
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
    • H04L67/125Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks involving the control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00365Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00507Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function
    • G07C2009/00531Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function immobilizer
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00507Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function
    • G07C2009/00547Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function starting ignition

Abstract

FIELD: security means.SUBSTANCE: invention relates to vehicle safety systems. Mobile device for vehicle communication authentication comprises communication module, memory and key access module. Memory includes an application for accessing digital keys. Key access module is made with the ability to activate, in response to the determination that the application is inactive, the application using the signal, access the key from the database through the application and send the key to the vehicle through the communication module.EFFECT: improved vehicle safety.20 cl, 4 dwg

Description

Cross reference to related application
[0001] This application relates to US application number attorney's file 83739820 (026780-8536), filed December 7, 2016, which is incorporated herein by reference in its entirety.
The technical field to which the invention relates.
[0002] The present invention relates generally to communication authentication, and more specifically to the authentication of mobile devices for communication with a vehicle.
The level of technology
[0003] Often a vehicle uses a remote keyless entry system to allow the user (eg driver) to unlock and / or open the door without inserting a key into the lock. In some cases, the remote keyless entry system includes a keychain that is worn by the user. The key fob includes a wireless transmitter that communicates with the vehicle to unlock and / or open the vehicle door. Some remote keyless entry systems are passive access systems that unlock and / or open the vehicle door when it detects that the key fob is in proximity to the vehicle.
Summary of Invention
[0004] The appended claims define the subject matter of the invention. The present disclosure summarizes aspects of the embodiments and should not be used to limit the claims. Other implementations are contemplated according to the techniques described in this document, as will be clear to the person skilled in the art after reviewing the subsequent drawings and detailed description, and such implementations are intended to be within the scope of this application.
[0005] Exemplary embodiments are shown for authenticating mobile devices to communicate with a vehicle. The exemplary described mobile device for authenticating communication with a vehicle includes a communication module to receive a signal from the vehicle, a memory including an application for accessing the digital keys, and a key access module. An exemplary key access module should activate, in response to determining that an application is inactive, an application using a signal. An exemplary key access module must also access the key through the application and send, via the communication module, the key to the vehicle.
[0006] An exemplary disclosed method for authenticating a mobile device to communicate with a vehicle includes receiving, via a mobile device, a signal that is associated with the vehicle, and determining, through a processor, whether the application is active to access the key on the mobile device. The exemplary disclosed method also includes activation, in response to determining that the application is inactive, of the application using a signal. An exemplary disclosed method also includes accessing a key through an application and sending the key to a vehicle through a communication module.
[0007] The exemplary disclosed system for authenticating a mobile device to communicate with a vehicle includes a mobile device to receive a signal and activate, in response to determining that the application for accessing the digital keys is inactive, the application on the mobile device using the signal . An exemplary mobile device should also access the key through the application. The exemplary described system also includes a vehicle to send a signal, receive a key from a mobile device, and determine whether to authenticate the mobile device based on the key.
In particular, in one aspect of the invention, a mobile device is disclosed for authenticating the communication of the vehicle, the mobile device comprising: a communication module to receive a signal from the vehicle; a memory including an application for accessing the digital keys; and a key access module, configured to: activate, in response to determining that the application is inactive, the application using a signal; access the key through the application; and send the key to the vehicle through the communication module.
In one embodiment, the key access module accesses the key from the database.
In one embodiment, the key access module accesses the key from the network through the second communication module.
In one embodiment, the signal is a low-power beacon, and the communication module is a short-range wireless communication module that receives a low-power beacon when the mobile device is in the proximity of the vehicle.
In one embodiment, the key access module accesses and the communication module sends the key when the mobile device is in the locked mode.
In one embodiment, the key access module activates the application when the mobile device is in a locked mode.
In another aspect of the invention, a method of authenticating a mobile device for communication with a vehicle is disclosed, the method comprising the steps of: receiving a signal on a mobile device that is associated with the vehicle; determine, through the processor, whether the application is active to access the key on the mobile device; activate, in response to the determination that the application is inactive, the application using a signal; access the key through the application; and send the key to the vehicle through the communication module.
In one embodiment, receiving a signal associated with a vehicle includes receiving a low-power beacon transmitted by the vehicle through the communication module of the mobile device when the mobile device is in the proximity of the vehicle.
In one embodiment, the reception of a signal associated with a vehicle includes the step of receiving an indicator of the intensity of a received signal from a mobile device when the mobile device is in the proximity of the vehicle.
In one embodiment, accessing a key includes accessing a database from a network through a second communication module of a mobile device.
In one embodiment, accessing and sending the key includes the steps of accessing and sending the key when the mobile device is in a locked mode.
In one embodiment, the activation of the application includes the step of activating the application when the mobile device is in a locked mode.
In another aspect of the invention, a system is disclosed for authenticating a mobile device to communicate with a vehicle, the system comprising: a mobile device configured to: receive a signal; activate, in response to determining that the application for accessing digital keys is inactive, the application on the mobile device using a signal; and access the key through the application; and a vehicle adapted to: broadcast the signal; receive a key from a mobile device; and determine whether to authenticate the mobile device based on the key.
In one embodiment, the signal is a low power beacon that a mobile device receives when the mobile device is in the proximity of the vehicle.
In one embodiment, the mobile device activates the application when the mobile device is in locked mode.
In one embodiment, the vehicle authenticates the mobile device for communication between the mobile device and the vehicle.
In one embodiment, after authenticating the mobile device, the vehicle receives a message from the mobile device in order to prepare the vehicle for passive access by the approaching user.
In one embodiment, the vehicle includes a device authentication module that evaluates a key received from a mobile device to determine whether to authenticate the mobile device.
In one embodiment, the device authentication module is configured to: compare the key with the database key records; and authenticate the mobile device when the key matches one of the database key entries.
In one embodiment, the device authentication module is configured to: hash the key received from the mobile device to create a hashed key; compare the hashed key with the database key entries; and authenticate the mobile device when the hashed key matches one of the database key entries.
Brief Description of the Drawings
[0008] For a better understanding of the invention, reference may be made to the embodiments shown in the following drawings. The components in the drawings are not necessarily drawn to scale, and related elements may be omitted, or in some cases the proportions may be exaggerated in order to emphasize and clearly illustrate the new features described in this document. In addition, system components can be placed in different ways, as is known in the art. In addition, in the drawings, the same reference numerals denote corresponding parts throughout the several views.
[0009] FIG. 1 illustrates an exemplary vehicle and exemplary mobile device in accordance with the teachings herein.
[0010] FIG. 2 is a block diagram illustrating the electronic components of the mobile device in FIG. one.
[0011] FIG. 3 is a block diagram of the electronic components of the vehicle of FIG. one.
[0012] FIG. 4 is a block diagram of an exemplary method to authenticate the mobile device in FIG. 1 to communicate with the vehicle in FIG. one.
Detailed description of exemplary embodiments.
[0013] While the invention may be implemented in various forms, shown in the drawings, and will be described later in this document, some exemplary and non-limiting embodiments with the understanding that the present invention should be considered an illustration of the invention and is not intended to limit Invention with specific illustrated embodiments.
[0014] Vehicles often include remote keyless entry systems to allow the user (eg the driver) to unlock and / or open the door without inserting a key into the lock. Some remote keyless entry systems are passive access systems in which the vehicle unlocks and / or opens the vehicle door when it detects that a user is in the vicinity of the vehicle. In some cases, the passive access system uses a keyfob that is worn by the user and is in communication with the vehicle in order to detect the user's approaching the vehicle. In other cases, the passive access system uses an application running on a user's mobile device (for example, a smartphone) that communicates with the vehicle in order to detect that the user is approaching the vehicle. In some cases, a passive access system may require the mobile device to be authenticated by the vehicle in order to prevent unauthorized users from accessing the vehicle. In some such cases, the vehicle may not be able to authenticate the mobile device if the application does not work on the mobile device, thereby preventing the passive access system from unlocking and / or opening the vehicle door for the user.
[0015] The examples described in this document include a passive access system in which an inactive passive access application of a mobile device (for example, a smartphone, tablet, smart watch, portable electronic device, etc.) is activated when the user approaches vehicle, without user interaction, to allow the vehicle to authenticate, through the application, the communication between the mobile device and the vehicle.
[0016] When used in this document, the terms "application" and "application program" refer to a program installed on a device (for example, a mobile device) that is intended to perform a specific set of functions, tasks, or actions. When used in this document, an “inactive” application refers to an application that is installed on a device for which the device’s operating system is not currently running or does not execute instructions. When used in this document, the “active” application refers to the application installed on the device for which the device’s operating system is currently running or executing instructions. Active applications include priority applications and a background application. When used in this document, the term "priority application" refers to the active application that provides the user interface (i.e., the application runs in the foreground of the device). When used in this document, the term "background application" refers to an active application that does not provide an interface to the user (i.e., the application is running in the background of the device). When used in this document, the term "activation" or "activate" an application refers to instructing the device's operating system to begin executing or executing instructions for an application. When used in this document, the term "authentication" or "authenticate" refers to the confirmation or authorization of one device (for example, a mobile device) to communicate with another device (for example, a vehicle).
[0017] The mobile device of the examples described herein receives a signal when the mobile device is near or near the vehicle. The mobile device includes a memory that includes an application for accessing digital keys (e.g., encryption keys). The mobile device also includes a key access module that determines whether the application is active and, in response to determining that the application is inactive, activates the application using a signal as an indication. Additionally, the key access module accesses the key through the application and sends the key to the vehicle through the mobile device communication module.
[0018] In some examples, the key access module activates the application, the key access module accesses the key, and / or the communication module sends the key to the vehicle when the mobile device is in locked mode. When used in this document, the term "locked mode" refers to the mobile device mode in which the user must unlock the mobile device (for example, by means of a password, fingerprint, and / or some other user verification tool) to interact with the mobile device application . Additionally, the mobile key access module can access the key from the database. In some examples, the database is stored on a mobile device. In other examples, a key access module accesses a key from a network (eg, the Internet) through a second mobile device communication module.
[0019] The vehicle of the examples described herein includes a communication module that receives a key sent from a mobile device and a device authentication module that determines whether to authenticate the mobile device by evaluating the key. In some examples, the device authentication module compares the key with the vehicle key database entries and authenticates the mobile device when the key received from the mobile device matches one of the vehicle database key entries. Additionally or alternatively, the device authentication module hashes the key received from the mobile device to generate the hashed key, compares the hashed key with the vehicle key database entries and authenticates the mobile device when the hashed key matches one of the vehicle key records.
[0020] In response to the fact that the device authentication module authenticates the mobile device, the device authentication module allows the vehicle communication module to receive a message from the mobile device, for example, to prepare the vehicle for passive access by the approaching user. When used in this document, the term “vehicle preparation” or “prepare vehicle” refers to the initiation of one or more vehicle systems and / or devices to allow a user to access a vehicle. For example, preparing a vehicle includes unlocking, opening and / or preparing one or more vehicle doors and / or activating vehicle lighting for an approaching user. When used in this document, the term “door preparation” refers to instructing the electronic lock to unlock the corresponding door when it detects that the user has attempted to open the door (for example, by touching the door handle).
[0021] In some examples, the communication module of the mobile device receives a signal that is used to activate the application when the mobile device is in the approach range of the vehicle. In some such examples, the mobile device communication module is a short-range wireless communication module, a vehicle communication module is a short-range wireless communication module, and the signal is a low-power beacon (for example, a low-power Bluetooth® beacon) that is broadcast by short-range wireless communications of the vehicle and is received by the short-range wireless communication module of the mobile device. When used in this document, the term "beacon signal" is a signal that is periodically transmitted by a source.
[0022] In some examples, the vehicle includes a GPS receiver that identifies the location of the vehicle, and the mobile device includes a GPS receiver that identifies the location of the vehicle. In some such examples, the GPS receiver of the mobile device receives a signal that is used to activate the application when the mobile device is in the vehicle's approach range. The mobile device’s GPS receiver can receive a signal when the location identified by the GPS receiver of the mobile device is near or close to the location identified by the vehicle’s GPS receiver.
[0023] Referring to the drawings, FIG. 1 illustrates an exemplary vehicle 100 and a user 102 with an exemplary mobile device 104 (eg, a smartphone, tablet, smart watch, portable electronic device, etc.) in accordance with the teachings in this document. The vehicle 100 may be a conventional gasoline engine vehicle, a hybrid vehicle, an electric vehicle, a fuel cell vehicle, and / or any other type of vehicle mobility implementation. Vehicle 100 includes mobility-related parts, such as an engine power chain, gearbox, suspension, drive shaft and / or wheels, etc. Vehicle 100 may be non-autonomous, semi-autonomous (for example, certain routine driving functions are controlled by vehicle 100) or autonomous (for example, driving functions are controlled by vehicle 100 without direct driver input).
[0024] The vehicle 100 of the illustrated example includes a communication module 106 that is connected to communicate with a mobile device 104. In the illustrated example, the communication module 106 is a short-range wireless communication module that includes a wireless sensor to communicate with the mobile device 104 and / or another device that is in the broadcast range or within the distance of the communication module 106. A short-range wireless communication module includes hardware and firmware to establish a connection with a mobile device 104. In some examples, a short-range wireless communication module implements Bluetooth® and / or Bluetooth® Low Energy (BLE) protocols. The Bluetooth® and BLE protocols are outlined in Volume 6 of the Bluetooth® 4.0 specification (and later), supported by a group of Bluetooth® manufacturers. In the illustrated example, the vehicle 100 includes one communication module (eg, communication module 106). In other examples, vehicle 100 includes a plurality of communication modules that need to be in communication with the mobile device 104 and are located at different locations throughout the vehicle 100.
[0025] As illustrated in FIG. 1, the broadcast range of communication module 106 determines the proximity range 108 of vehicle 100 in which communication module 106 may communicate with mobile device 104 and / or another device. For example, when mobile device 104 is in range 108 of the proximity of vehicle 100, mobile device 104 may receive a beacon 110 (eg, a low power beacon, such as a Bluetooth® (BLE) low power beacon), which is transmitted periodically by the communication module 106 vehicle 100. When mobile device 104 is out of proximity range 108, mobile device 104 cannot receive the beacon 110 transmitted by communication module 106. Thus, the communication module 106 of the vehicle 100 uses the beacon 110 to determine whether the mobile device 104 is close to (for example, in the proximity range 108) of the vehicle 100. In some examples, the beacon 110 is transmitted by the communication module 106 at a constant frequency ( for example, one broadcast per second). In other examples, the frequency with which communication module 106 transmits a beacon 110 depends on the distance between communication module 106 and mobile device 104. For example, communication module 106 may broadcast the beacon 110 with a higher frequency the closer mobile device 104 is to the vehicle 100.
[0026] The communication module 106 of the illustrated example may also receive a key 112 (for example, a digital key, an encryption key) from the mobile device 104 when the mobile device 104 is in the proximity range of the vehicle 100. The mobile device 104 sends the key 112 to the transport communication module 106 means when receiving the beacon signal 110 to enable the vehicle 100 to authenticate the mobile device 104 for additional communication with the vehicle 100. For example, after authenticating the transport With orienting means 100, mobile device 104 sends a message 114, which is received by vehicle 100 when user 102 approaches vehicle 100. Message 114 may instruct vehicle 100 to prepare vehicle 100 for the passive landing of user 102.
[0027] The vehicle 100 of the illustrated example also includes a global positioning system (GPS) receiver 116 to identify the location of the vehicle 100. For example, if the GPS receiver 116 is active (for example, the vehicle 100 is turned on), the GPS receiver 116 identifies the current location of the vehicle 100. Otherwise, if the GPS receiver 116 is inactive (for example, the vehicle 100 is turned off), the GPS receiver 116 can identify the last known parked location vehicle 100. In some examples, GPS receiver 116 is used to determine if mobile device 104 is close to vehicle 100, for example, comparing the location of a mobile device (for example, identified via GPS receiver 212 of mobile device 104 in Fig. 2 ) with the location of the vehicle 100. Additionally or alternatively, the associated GPS system and / or received signal intensity indicator (RSSI) is used to determine the distance between the mobile device device 104 and vehicle 100. For example, communication module 106 receives RSSI from mobile device 104 when mobile device 104 is in range 108 of proximity of vehicle 100.
[0028] The vehicle 100 also includes a device authentication module 118 that authenticates the mobile device 104 and / or any other device to provide additional communication between the vehicle 100 and the mobile device 104 and / or another device. The device authentication module 118 is connected to communicate with the communication module 106 to receive the key 112 and / or the message 114 sent by the mobile device 104.
[0029] In operation, vehicle 100 sends a signal that mobile device 104 must receive when mobile device 104 is close to vehicle 100. In some examples, communication module 106 (eg, short-range wireless communication module) broadcasts a low-power beacon which is received by the communication module (for example, the communication module 210 in FIG. 2) of the mobile device 104 when the mobile device 104 is in the range 108 of the proximity of the vehicle 100. Additionally or alternatively orally, mobile device 104 receives a geo-sensitive signal associated with vehicle 100 when mobile device 104 is close to vehicle 100. A geo-sensitive signal is a global positioning signal that is sent to a device (for example, mobile device 104) when this device is in the range the proximity of another device (for example, in the range 108 of the proximity of the vehicle 100).
[0030] When receiving a signal from vehicle 100, mobile device 104 determines whether an application is active to access securely stored digital keys on mobile device 104. An application may be inactive when user 102 approaches vehicle 100, for example, if user 102 turned off the mobile device, the battery 104 of the mobile device 104 is exhausted, the user 102 closed the application, etc. without subsequent reactivation of the application.
[0031] In response to determining that the application is inactive, the mobile device 104 activates the application using a received signal, which is associated with the fact that the mobile device 104 is close to the vehicle 100 (for example, beacon signal 110), as an indication. For example, mobile device 104 uses a signal associated with vehicle 100 to activate an application without user interaction between user 102 and application of mobile device 104. Mobile device 104 can activate an application using a received signal when mobile device 104 is in locked mode to provide activation of the application without user interaction between the user 102 and the mobile device 104.
[0032] After the application is activated, the mobile device 104 accesses the key 112 via the application and sends the key 112 to the communication module 106 of the vehicle 100 to allow the device authentication module 118 to authenticate the mobile device 104 for further communication. The application can access and send the key 112 to the vehicle 100 when the application is running as a background application or a priority application on the mobile device 104. Additionally or alternatively, the application accesses and sends the key 112 to the vehicle 100 without user interaction between the user 102 and the mobile device 104 For example, the mobile device 104 may activate the application, access the key 112, and send the key 112 to the communication module 106 of the vehicle VA 100, while mobile device 104 remains in locked mode. By allowing the mobile device 104 to access and send the key 112 without user interaction between the user 102 and the mobile device 104, the application of the mobile device 104 allows the mobile device to operate as a wireless key in the passive access system of the vehicle 100.
[0033] The vehicle communication module 106 receives the key 112 sent from the mobile device 104, and the device authentication module 118 determines whether the mobile device 104 authenticates for further communication with the vehicle 100. For example, the device authentication module 118 evaluates the key 112 received from the mobile device 104 to determine whether the mobile device 104 authenticates. For example, the device authentication module 118 authenticates the mobile device 104 to communicate with the vehicle 100, cf. VNIVI key 112 sent by the mobile device 104, with recordings key database (e.g., database 314 of FIG. 3), which is available for the device authentication module 118. The device authentication module 118 authenticates the mobile device 104 for further communication with the vehicle 100 when the key 112 received from the mobile device 104 matches one of the database key entries. In some examples, the device authentication module 118 hashes, via a hash function, the key 112 received from the mobile device 104 into a hashed key. In such examples, the device authentication module 118 compares the hashed key with the database key records and authenticates the mobile device 104 when the hashed key matches one of the database key records.
[0034] When the device authentication module 118 authenticates the mobile device 104, the device authentication module 118 allows the vehicle communication module 106 to receive the message 114 from the mobile device 104. For example, the vehicle communication module 106 receives the message 114 to receive instructions from the mobile the device 104 to prepare the vehicle 100 for passive access by the user 102 approaching the vehicle 100.
[0035] FIG. 2 is a block diagram of the electronic components 200 of the mobile device 104. As illustrated in FIG. 2, the electronic components 200 include a microcontroller unit, a controller or processor 202. Additionally, the electronic components 200 include a memory 204, a database 206, a communication module 208, a communication module 210, and a GPS receiver 212.
[0036] In the illustrated example, the processor 202 of the mobile device 104 is structured to include a key access module 214. The processor 202 may be any suitable processing device or set of processing devices, such as, but not limited to, a microprocessor, a microcontroller-based platform, an integrated circuit, one or more user-programmable gate arrays (FPGAs), and / or one or more specialized integrated circuits ( ASIC).
[0037] The memory 204 may be volatile memory (e.g., RAM, including non-volatile RAM, magnetic RAM, ferroelectric RAM, etc.), non-volatile memory (e.g., disk memory, flash memory, multiple EPROM, multiple EEPROM, memristor non-volatile solid-state memory, etc.), non-volatile memory (for example, multiple EPROMs), read-only memory and / or high-capacity storage devices (for example, hard disk drives, solid-state drives, etc.). In some examples, memory 204 includes many types of memory, in particular, volatile memory and non-volatile memory.
[0038] The memory 204 is computer-readable media on which one or more sets of instructions can be embedded, such as software for operating the methods of the present invention. Instructions may implement one or more methods or logic that is described in this document. For example, memory 204 includes a computer-readable drive that has instructions for an application for accessing digital keys. The instructions may be completely, or at least partially, in any one or more of the memory 204, computer-readable media, and / or in the processor 202 during the execution of the instructions.
[0039] The terms "non-transitory computer-readable media" and "computer-readable media" include single media or multiple media, such as centralized or distributed database and / or associated caches and servers that store one or more sets of instructions. Additionally, the terms “non-transitory computer-readable medium” and “computer-readable medium” include any tangible medium that can store, encode, or carry a set of instructions for the processor to execute, or that instructs the system to perform any one or more of the methods or operations disclosed in this document. When used in this document, the term "computer-readable medium" is explicitly defined to include any type of computer-readable storage device and / or disk for storage and excluding propagated signals.
[0040] The electronic components 200 of the illustrated example include a database 206 that securely stores a plurality of keys that can be used to authenticate the mobile device 104 to communicate with the vehicle 100. Additionally or alternatively, the electronic components 200 include a module 208 communication, which connects to the ability to exchange data with the network (for example, the Internet). In some such examples, the network includes a database that securely stores a plurality of keys for authenticating the mobile device 104 with the vehicle 100.
[0041] In an illustrative example, the electronic components 200 also include a communication module 210, which is to be connected to communicate with the communication module 106 of the vehicle 100. For example, the communication module 210 receives a beacon 110 (for example, a low-power beacon) broadcast the communication module 106 of the vehicle 100, and sends the key 112 and the message 114 to the communication module 106. In some examples, the communication module 106 is a short-range wireless communication module that includes a wireless sensor to wirelessly communicate with the communication module 106 of the vehicle 100. The short-range wireless communication module includes hardware and firmware to install connection to a mobile device 104. In some examples, the short-range wireless communication module implements Bluetooth® and / or Bluetooth® Low Energy (BLE) protocols.
[0042] The GPS receiver 212 of the electronic components identifies the location of the mobile device 104. Additionally, the GPS receiver 116 can be used to determine whether the mobile device 104 is close to the vehicle 100. For example, when the mobile device 104 is close to the vehicle 100, the mobile device 104 receives a geo-sensitive signal associated with the vehicle 100, which indicates that the mobile device 104 is in the proximity range 108 of the vehicle 100.
[0043] In operation, the mobile device 104 receives a signal associated with the vehicle 100 when the mobile device 104 is close to the vehicle 100. For example, the communication module 210 receives a beacon 110, which is broadcast by the communication module 106 of the vehicle 100. Additionally or alternatively, the GPS receiver 212 of the mobile device 104 receives a geo-sensitive signal when the mobile device 104 is close to the vehicle 100. When receiving a signal associated with a transport By means of the tool 100, the key access module 214 of the processor 202 determines whether the application is actively accessing the digital keys. In response to determining that the application is inactive, the key access module 214 activates the application using a signal as a guide.
[0044] After the application is activated, the key access module 214 uses the application to access the key 112. In some examples, the key access module 214 accesses, through the application, the key 112 from the database 206. Alternatively, the module 214 Key Access uses the application and communication module 208 to access Key 112 from a database stored on a network (for example, the Internet). The key access module 214 then sends the key 112 to the communication module 106 of the vehicle 100 through the communication module 210 of the mobile device 104. In some examples, the key access module 214 activates the application, accesses the key 112, and / or sends the key 112 to the vehicle 100 when mobile device is in locked mode. Further, after the key access module 214 sends the key 112 to the communication module 106 of the vehicle 100, the communication module 210 of the mobile device 104 sends a message 114 to the communication module 106 of the vehicle 100. For example, the communication module 210 sends the message 114 to the communication module 106 to prepare vehicle 100 for user 102.
[0045] FIG. 3 is a block diagram of the electronic components 300 of the vehicle 100. As illustrated in FIG. 3, electronic components 300 include a body control module 302, a communication module 106, a GPS receiver 116, sensors 304, electronic control units (ECU) 306, and a vehicle information bus 308.
[0046] The body control module 302 controls one or more subsystems throughout the vehicle 100, such as lighting, power windows, immobilizer system, power mirrors, etc. For example, the body control module 302 includes circuitry that drives one or more relays (for example, to control a wiper fluid, etc.), direct current (DC) brush motors (to control electric-powered seats, power windows with electric drive, wiper blades, etc.), stepping motors, multiple LEDs, etc.
[0047] The body control module 302 includes a microcontroller unit, a controller or processor 310, and a memory 312. In some examples, the body control module 302 is structured to include a device authentication module 118. Alternatively, in some examples, the device authentication module 118 is embedded in another electronic control unit (ECU) with its own processor 310 and memory 312. The processor 310 may be any suitable processing device or set of processing devices, such as, but not limited to, a microprocessor. microcontroller-based platform, integrated circuit, one or more user-programmable gate arrays (FPGAs), and / or one or more specialized integrated circuits (ASICs). Memory 312 may be volatile memory (e.g., RAM, including non-volatile RAM, magnetic RAM, ferroelectric RAM, etc.), non-volatile memory (e.g., disk memory, flash memory, multiple EPROMs, multiple EEPROM, non-volatile solid-state memory memory, etc.), non-volatile memory (for example, multiple EPROMs), read-only memory and / or high-capacity storage devices (such as hard disk drives, solid-state drives, etc.). In some examples, memory 312 includes many types of memory, in particular, volatile memory and non-volatile memory.
[0048] The memory 312 is computer-readable media on which one or more sets of instructions can be embedded, such as software for operating the methods of the present invention. Instructions may implement one or more methods or logic as described in this document. For example, instructions are completely, or at least partially, in any one or more of the memory 312, computer-readable media, and / or in the processor 310 during the execution of instructions.
[0049] Additionally, the body control module 302 of the illustrated example includes a database 314 that includes a plurality of key entries. The device authentication module 118 compares the key records of the database 314 with the key 112 and / or the hashed key to determine whether to authenticate the mobile device 104 for further communication with the vehicle 100.
[0050] Sensors 304 are placed in and around vehicle 100 to monitor the properties of vehicle 100 and / or the environment in which vehicle 100 is located. One or more sensors 304 can be installed to measure properties around the outside of the vehicle 100. Additionally or alternatively, one or more sensors 304 can be installed inside the cabin of the vehicle 100 or in the back of the vehicle 100 (eg, engine compartment, wheel bays etc.) to measure properties inside the vehicle 100. For example, sensors 304 include accelerometers, odometers, tachometers, angle sensors with respect to the transverse and vertical axis, sensors ck Wheels, microphones, tire pressure sensors, biometric sensors and / or sensors of any other suitable type. In the illustrated example, the sensors 304 include a door tightly closed sensor 316, an ambient light sensor 318, and a camera 320. For example, a loose door sensor 316 detects whether a vehicle door is open before and / or after the vehicle 100 is prepared for passive user access 102. The ambient light sensor 318 and / or camera 320 can measure the ambient light for vehicle 100 to affect lighting (for example, interior lighting, external lighting). light situations) of the vehicle 100 when the vehicle 100 is prepared for user access 102.
[0051] The ECU 306 monitors and controls the subsystems of the vehicle 100. For example, the ECU 306 are discrete electronics sets that include their own circuit (s) (such as integrated circuits, microprocessors, memory, storage, etc.) and software and hardware, sensors, actuators and / or mounting hardware. The ECU 306 transmits and exchanges information via a vehicle information bus (for example, a vehicle information bus 308). Additionally, ECU 306 can report properties (such as the state of multiple ECU 306, sensor readings, control status, errors and diagnostic codes, etc.) and / or accept requests from each other. For example, vehicle 100 may have seventy or more ECUs 306, which are located at different locations around vehicle 100 and are connected with the ability to exchange data via vehicle information bus 308. In the illustrated example, the ECU 306 includes a lighting control module 322, an engine control block 324, and a door control block 326. The lighting control module 322 controls the internal and / or external lamps of the vehicle 100, the engine control unit 324 can control the remote engine start of the vehicle 100, and the door control unit 326 controls (for example, locks, unlocks, prepares) the electric locks of the doors of the vehicle 100.
[0052] The vehicle data bus 308 is connected to communicate with a communication module 106, a GPS receiver 116, a body control module 302, sensors 304, and a plurality of ECU 306. In some examples, the vehicle information bus 308 includes one or more tires. The vehicle information bus 308 can be implemented in accordance with the controller's local area network bus (CAN) protocol, which is defined by the International Organization for Standardization (ISO) 11898-1, the multimedia system data bus protocol (MOST), the flexible CAN bus information protocol (CAN -FD) (ISO 11898-7) and / or the K-line bus protocol (ISO 9141 and ISO 14230-1) and / or the Ethernet ™ IEEE 802.3 bus protocol (2002 and beyond), etc.
[0053] FIG. 4 is a flowchart of an exemplary method 400 to authenticate a mobile device to communicate with a vehicle. The flow chart of FIG. 4 is representative of machine-readable instructions that are stored in memory (such as memory 204 in FIG. 2 and / or memory 312 in FIG. 3) and include one or more programs that, when executed by a processor (such as processor 202 in FIG. 2 and / or processor 310 in FIG. 3) instruct vehicle 100 to implement exemplary key access module 214 in FIG. 2 and / or the exemplary device authentication module 118 in FIG. 1 and 3. While the exemplary program is described with reference to the flowchart illustrated in FIG. 4, many other ways of implementing the exemplary key access module 214 and / or device authentication module 118 may alternatively be used. For example, the order of execution of the steps may be reconfigured, modified, eliminated and / or combined to perform the method 400. Additionally, since the method 400 is disclosed in connection with the components in FIG. 1-3, some of the functions of these components will not be described in detail below.
[0054] Initially, at step 402, the communication module 106 of the vehicle 100 broadcasts a signal (for example, a beacon signal 110). At step 404, the communication module 210 of the mobile device 104 receives a signal when the mobile device 104 is in the proximity range 108 of the vehicle 100. In other examples, the signal associated with the vehicle 100 is a geo-sensitive signal that the GPS receiver 212 of the mobile device 104 receives when the mobile device 104 is in the range 108 of the proximity of the vehicle 100, as determined through the GPS receiver 116 of the vehicle 100.
[0055] At step 406, the key access module 214 of the mobile device 104 determines if the application for accessing the digital keys is inactive. If the application is inactive, the key access module 214 activates the application using a signal associated with the vehicle as an indication (step 408). If the application is activated at step 406 and / or after activating the application at step 408, the key access module 214 accesses the key 112 from the database. In some examples, the key access module 214 accesses the key 112 from the database 206 of the mobile device 104. In other examples, the key access module 214 accesses the key 112 from the database from the network (eg, the Internet) through the communication module 208. At step 412, the key access module 214 sends the key 112 via the communication module 210 of the mobile device 104 to the communication module 106 of the vehicle 100. In some examples, the key access module 214 activates the application at step 406, accesses the key 112 at step 410 and / or sends the key 112 to the vehicle 100, while the mobile device 104 remains in locked mode, without user interaction between the user 102 and the mobile device 104.
[0056] At step 414, the vehicle communication module 106 receives the key 112 from the communication module 210 of the mobile device 104. At step 416, the device device authentication module 118 of the vehicle 100 evaluates the key 112 for authentication. For example, the device authentication module 118 evaluates the key 112 by comparing the key 112 with the key records of the database 314, which is available to the device authentication module 118. In other examples, the device authentication module 118 evaluates the key 112 by hashing the key 112 into a hashed key and comparing the hashed key with the database key entries 314. At step 418, the device authentication module 118 determines whether the mobile device 104 is authenticated. 104, does not match one of the database key entries 314, method 400 ends.
[0057] If the key 112 corresponds to one of the key entries of the database 314, the method continues to step 420, in which the communication module 210 of the mobile device 104 sends a message 114 to the communication module 106 of the vehicle 100. For example, the message 114 includes instructions for preparing the transport means 100 for user access 102. At step 422, the communication module 106 of the vehicle 100 receives a message 114 from the communication module 210 of the mobile device 104. At step 424, the vehicle 100 is prepared for user access 102 to e instructions included in the message 114.
[0058] In this application, the use of a disjunctive judgment is intended to include a conjunctiva. The use of definite or indefinite articles is not intended to indicate the number of elements. In particular, the reference to the object in the singular is intended to denote also one of the possible set of such objects. Additionally, the conjunction "or" can be used to transmit attributes that are present simultaneously, instead of mutually exclusive alternatives. In other words, the conjunction "or" should be understood as including "and / or". The terms "includes", "including" and "include" are inclusive and have the same context as "contains", "containing" and "contain", respectively.
[0059] The above embodiments, and in particular any "preferred" embodiments, are possible examples of implementations and are merely set forth for a clear understanding of the principles of the invention. Many variations and modifications can be made in the above embodiment (s) of implementation with little or no deviation from the essence and principles of the technologies described in this document. All modifications are intended to be included herein in the scope of this invention and are protected by the following claims.

Claims (44)

1. A mobile device for authenticating a vehicle communication, the mobile device comprising:
a communication module to receive a signal from the vehicle;
a memory including an application for accessing the digital keys; and
a key access module configured to:
activate, in response to the determination that the application is inactive, the application using a signal;
access the key from the database through the application; and
send the key to the vehicle through the communication module.
2. The mobile device according to claim 1, wherein the key access module accesses the key from the network through the second communication module.
3. The mobile device of claim 1, wherein the signal is a low power beacon, and the communication module is a short-range wireless communication module that receives a low power beacon when the mobile device is in the proximity range of the vehicle.
4. The mobile device of claim 1, further comprising a database, the database including key entries.
5. The mobile device according to claim 1, wherein the key access module accesses and the communication module sends the key when the mobile device is in the locked mode.
6. The mobile device according to claim 5, wherein the key access module activates the application when the mobile device is in the locked mode.
7. A method for authenticating a mobile device, comprising:
receive a signal associated with the vehicle on the mobile device;
determine, through the processor, whether the application is active to access the key on the mobile device;
activate, in response to determining that the application is inactive, the application using the signal without user interaction with the mobile device when the mobile device is in a locked mode;
access the key through the application; and
send the key to the vehicle.
8. The method of claim 7, wherein receiving a signal associated with the vehicle includes receiving a low-power beacon transmitted by the vehicle when the mobile device is in the proximity of the vehicle.
9. The method of claim 7, wherein receiving a signal associated with the vehicle includes receiving an indicator of the intensity of the received signal from the mobile device when the mobile device is in the proximity of the vehicle.
10. A method according to claim 7, in which the implementation of access to the key includes the stage at which access to the database from the network through the communication module of the mobile device.
11. The method of claim 7, wherein accessing and sending the key includes the steps of accessing and sending the key without user interaction with the mobile device when the mobile device is in a locked mode.
12. A system for authenticating a mobile device, comprising:
mobile device configured to:
receive a signal;
activate, in response to determining that the key access application is inactive, the application using a signal without user interaction while in locked mode; and
access the key through the application; and
vehicle adapted to:
broadcast the signal;
receive a key from a mobile device; and
determine whether to authenticate the mobile device, based on the key.
13. The system of claim 12, wherein the signal is a low-power beacon that the mobile device receives when the mobile device is in the proximity of the vehicle.
14. The system of claim 12, wherein the mobile device activates the application without user interaction while in unlocked mode.
15. The system of claim 12, wherein the mobile device is configured to access the key and send the key to the vehicle without user interaction while in the locked mode.
16. The system of claim 12, wherein the vehicle authenticates the mobile device for communication between the mobile device and the vehicle.
17. The system of claim 16, wherein, after authenticating the mobile device, the vehicle receives a message from the mobile device to prepare the vehicle for passive access of the approaching user.
18. The system of claim 12, wherein the vehicle includes a device authentication module that evaluates a key received from the mobile device to determine whether to authenticate the mobile device.
19. The system according to claim 18, in which the device authentication module is configured to:
compare key with database key records; and
authenticate the mobile device when the key matches one of the database key entries.
20. The system of claim 18, wherein the device authentication module is configured to:
hash the key received from the mobile device to create a hashed key;
compare the hashed key with the database key entries; and
authenticate the mobile device when the hashed key matches one of the database key entries.
RU2017135020A 2016-12-07 2017-10-05 Mobile device for vehicle communication authentication, method and system for authentication of mobile device for communication with a vehicle RU2684974C2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US15/372,369 US9988016B1 (en) 2016-12-07 2016-12-07 Authentication of mobile devices for vehicle communication
US15/372,369 2016-12-07

Publications (3)

Publication Number Publication Date
RU2017135020A3 RU2017135020A3 (en) 2019-04-05
RU2017135020A RU2017135020A (en) 2019-04-05
RU2684974C2 true RU2684974C2 (en) 2019-04-16

Family

ID=60950398

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2017135020A RU2684974C2 (en) 2016-12-07 2017-10-05 Mobile device for vehicle communication authentication, method and system for authentication of mobile device for communication with a vehicle

Country Status (6)

Country Link
US (1) US9988016B1 (en)
CN (1) CN108173809A (en)
DE (1) DE102017128922A1 (en)
GB (1) GB2559248A (en)
MX (1) MX2017015815A (en)
RU (1) RU2684974C2 (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10328898B2 (en) 2016-10-12 2019-06-25 Denso International America, Inc. Passive entry / passive start systems and methods for vehicles
US10328899B2 (en) 2016-10-12 2019-06-25 Denso International America, Inc. Localization and passive entry / passive start systems and methods for vehicles
JP2018133744A (en) * 2017-02-16 2018-08-23 パナソニックIpマネジメント株式会社 Communication system, vehicle, and monitoring method
JP6685963B2 (en) * 2017-03-27 2020-04-22 京セラ株式会社 Electronic device, electronic device control method, and control program
JP6711309B2 (en) 2017-04-13 2020-06-17 株式会社デンソー Mobile terminal position detecting device and mobile terminal position detecting method
US10663569B2 (en) 2017-09-19 2020-05-26 Denso International America, Inc. Localization systems and methods using communication protocols with open channels and secure communication connections
US10716068B2 (en) 2017-10-13 2020-07-14 Denso International America, Inc. Power saving methods for communication in localization systems
US10437745B2 (en) 2018-01-05 2019-10-08 Denso International America, Inc. Mobile de-whitening
US10917784B2 (en) 2018-03-27 2021-02-09 Denso International America, Inc. Systems and methods of cloud bonding for vehicles
US10706651B2 (en) 2018-03-28 2020-07-07 Denso International America, Inc. Systems and methods for communication bus security in a vehicle
US10839627B2 (en) 2018-03-28 2020-11-17 Denso International America, Inc. Reflective environment detection systems and methods
US10730479B2 (en) 2018-03-28 2020-08-04 Denso International America, Inc. Tamper security systems and methods for vehicles
US10977884B2 (en) 2018-07-09 2021-04-13 Denso International America, Inc. Half-hemisphere antennas for locating remote devices
US10885729B2 (en) 2018-10-12 2021-01-05 Denso International America, Inc. Passive entry/passive start systems using continuous wave tones and synchronization words for detecting range extender type relay station attacks
US10967836B2 (en) 2019-03-21 2021-04-06 Denso International America, Inc. Phone as a key vehicle access based on time policies, license information and validation and accuracy of a vehicle real time clock
US10864888B2 (en) 2019-03-21 2020-12-15 Denso International America, Inc. Systems and methods for activating vehicle functions
US20200353894A1 (en) * 2019-05-07 2020-11-12 T-Mobile Usa, Inc. Automobile driver biometric authentication and gps services

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2334624C2 (en) * 2004-07-15 2008-09-27 Тойота Дзидося Кабусики Кайся Hybrid vehicle, hybrid vehicle control method and power output device
US20110320089A1 (en) * 2010-06-25 2011-12-29 Toyota Motor Engineering & Manufacturing North America, Inc. Over-the-Air Vehicle Systems Updating and Associate Security Protocols
US20130099940A1 (en) * 2011-10-21 2013-04-25 Ford Global Technologies, Llc Method and Apparatus for User Authentication and Security

Family Cites Families (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10064546C1 (en) 2000-12-22 2002-07-04 Huf Huelsbeck & Fuerst Gmbh Locking system for motor vehicles
US6658328B1 (en) * 2002-01-17 2003-12-02 Trw Inc. Passive function control system for a motor vehicle
US7084734B2 (en) 2003-08-07 2006-08-01 Georgia Tech Research Corporation Secure authentication of a user to a system and secure operation thereafter
US7446644B2 (en) 2005-01-14 2008-11-04 Secureall Corporation Universal hands free key and lock system
JP5476663B2 (en) 2007-12-17 2014-04-23 トヨタ自動車株式会社 Code uneven key system
US20100052931A1 (en) 2008-08-26 2010-03-04 Gm Global Technology Operations, Inc. Gesture control key fob
US20100304690A1 (en) 2009-05-29 2010-12-02 Gm Global Technology Operations, Inc. Method of passively detecting an approach to a vehicle
US8045961B2 (en) 2009-06-22 2011-10-25 Mourad Ben Ayed Systems for wireless authentication based on bluetooth proximity
US8811900B2 (en) 2009-11-13 2014-08-19 Honda Motor Co., Ltd. System and method for hands free connect application for the automobile environment
US8284020B2 (en) * 2009-12-22 2012-10-09 Lear Corporation Passive entry system and method for a vehicle
TWI427882B (en) 2010-11-30 2014-02-21 Inventec Corp Computer device
CA2780393C (en) * 2011-06-21 2016-06-07 Dls Technology Corporation Key based secure operating system with secure dongle and method, and cryptographic method
US8868254B2 (en) 2012-06-08 2014-10-21 Apple Inc. Accessory control with geo-fencing
MX342365B (en) 2012-08-16 2016-09-27 Schlage Lock Co Llc Wireless reader system.
GB201219261D0 (en) 2012-10-26 2012-12-12 Jaguar Cars Vehicle access system and method
GB201219262D0 (en) 2012-10-26 2012-12-12 Jaguar Cars Vehicle access system and method
US9008917B2 (en) 2012-12-27 2015-04-14 GM Global Technology Operations LLC Method and system for detecting proximity of an end device to a vehicle based on signal strength information received over a bluetooth low energy (BLE) advertising channel
US9520939B2 (en) * 2013-03-06 2016-12-13 Qualcomm Incorporated Methods and apparatus for using visible light communications for controlling access to an area
US9679430B2 (en) 2013-03-08 2017-06-13 Lear Corporation Vehicle remote function system and method for determining vehicle FOB locations using adaptive filtering
US9002536B2 (en) * 2013-03-14 2015-04-07 Ford Global Technologies, Llc Key fob security copy to a mobile phone
US9241235B2 (en) * 2013-03-14 2016-01-19 Voxx International Corporation Passive entry cell phone and method and system therefor
US9462545B2 (en) 2013-03-14 2016-10-04 Ford Global Technologies, Llc Method and apparatus for a battery saver utilizing a sleep and vacation strategy
US20160004502A1 (en) * 2013-07-16 2016-01-07 Cloudcar, Inc. System and method for correcting speech input
TW201504927A (en) * 2013-07-22 2015-02-01 Byappy Digital Media Group Ltd Method for triggering applications with a smart device
US9086879B2 (en) 2013-07-26 2015-07-21 GM Global Technology Operations LLC Methods and apparatus for optimizing battery life in a remote device
US9858735B2 (en) 2013-12-10 2018-01-02 Ford Global Technologies, Llc User proximity detection for activating vehicle convenience functions
US9666005B2 (en) * 2014-02-14 2017-05-30 Infinitekey, Inc. System and method for communicating with a vehicle
EP3108460A1 (en) 2014-02-18 2016-12-28 Bekey A/S Controlling access to a location
WO2015155875A1 (en) * 2014-04-10 2015-10-15 三菱電機株式会社 Mobile device, vehicle remote control system, vehicle remote control method, and program
US9357368B2 (en) * 2014-05-23 2016-05-31 Ford Global Technologies, Llc Method and system for launching an application
US20160063786A1 (en) 2014-08-26 2016-03-03 Hyundai America Technical Center, Inc. Smartphone enabled passive entry go system
CN105898706A (en) * 2014-09-28 2016-08-24 上海快逸行信息科技有限公司 Method for sensing vehicle owner and providing real-time information via Bluetooth communication technology
US9656633B2 (en) * 2014-11-24 2017-05-23 Ford Global Technologies, Llc Methods and systems for a vehicle computing system to communicate with a device
US9495858B2 (en) 2015-01-25 2016-11-15 Toyota Motor Engineering & Manufacturing North America, Inc. Smart key reminder system for a vehicle
US9786108B2 (en) * 2015-06-03 2017-10-10 Nxp B.V. NFC based secure car key
CN105978923A (en) * 2015-10-21 2016-09-28 乐卡汽车智能科技(北京)有限公司 Remote wakeup method and system
CN105398420B (en) * 2015-11-09 2016-11-23 福建省汽车工业集团云度新能源汽车股份有限公司 A kind of automotive keyless entering system detection method
CN105979086A (en) * 2016-05-04 2016-09-28 广西咪付网络技术有限公司 Magnetic induction starting communication system based on mobile phone screen locking state
CN106169236A (en) * 2016-08-30 2016-11-30 杨光奇 A kind of wireless central control system of electric motor car based on low-power consumption bluetooth central site network topology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2334624C2 (en) * 2004-07-15 2008-09-27 Тойота Дзидося Кабусики Кайся Hybrid vehicle, hybrid vehicle control method and power output device
US20110320089A1 (en) * 2010-06-25 2011-12-29 Toyota Motor Engineering & Manufacturing North America, Inc. Over-the-Air Vehicle Systems Updating and Associate Security Protocols
US20130099940A1 (en) * 2011-10-21 2013-04-25 Ford Global Technologies, Llc Method and Apparatus for User Authentication and Security

Also Published As

Publication number Publication date
CN108173809A (en) 2018-06-15
MX2017015815A (en) 2018-11-09
GB2559248A (en) 2018-08-01
RU2017135020A3 (en) 2019-04-05
GB201719926D0 (en) 2018-01-17
US9988016B1 (en) 2018-06-05
DE102017128922A1 (en) 2018-06-07
US20180154865A1 (en) 2018-06-07
RU2017135020A (en) 2019-04-05

Similar Documents

Publication Publication Date Title
EP3287331B1 (en) Automotive security apparatus and associated methods
US9767627B2 (en) Method and apparatus for providing vehicle security
US10377343B2 (en) Keyless vehicle systems
US9688244B2 (en) Autonomous vehicle theft prevention
US20180293827A1 (en) Methods and devices for managing access to a vehicle
RU2711820C2 (en) System and method of facilitating entry for operator of automotive vehicle
CN105539365B (en) A kind of automobile intelligent key control method and its system
US9241235B2 (en) Passive entry cell phone and method and system therefor
RU2571395C2 (en) Transfer of vehicle keys to other driver and system to this end
JP6137687B2 (en) Keyless entry system
CN105376293B (en) Method and system for remote vehicle access enabled key fob base station
EP3063043B1 (en) Vehicle system for activating a vehicle component
KR20160096127A (en) Vehicle control system to prevent relay attack
US10410447B2 (en) System and method for communicating with a vehicle
US9802574B2 (en) Relay attack inhibiting
RU2573775C2 (en) Locating terminal and vehicle control system
US9336637B2 (en) Wireless access control system and related methods
US20190009747A1 (en) Vehicle start method
US9710983B2 (en) Method and system for authenticating vehicle equipped with passive keyless system
CN107067563B (en) Vehicle shared accessory device and system
US9002540B2 (en) Method for operating an authorization device for a keyless access to and start of a vehicle
US20160217635A1 (en) Virtual keyfob for vehicle sharing
US10142420B2 (en) On-board web server telematics systems and methods
DE102017108740A1 (en) Systems and methods for extending the range of a keyed phone
CN105844749B (en) A kind of Automobile handset system for unlocking and its unlocking method